Abstract is missing.
- SAM: A Spatial-Aware Learned Index for Disk-Based Multi-dimensional SearchHuan Zhou, Lei Yang, Yu Xiao, Yuanxiong He, Jian Hu, Weining Qian. 3-18 [doi]
- BIVXDB: A Bottom Information Invert Index to Speed up the Query Performance of LSM-TreeZekun Yao, Jiang Zhou, Zhixin Fan, Licheng Shan, Yinliang Yue, Yang Song. 19-34 [doi]
- Dual-Contrastive Multi-view Clustering Under the Guidance of Global Similarity and Pseudo-labelZiyi Yin 0005, Lihua Zhou, Lizhen Wang 0001, Hongmei Chen 0003. 35-49 [doi]
- A Powerful Local Search Method for Minimum Steiner Tree ProblemBoyu Yang, Weiguo Zheng. 50-66 [doi]
- FedOCD: A One-Shot Federated Framework for Heterogeneous Cross-Domain RecommendationZhi Liu 0009, Xiaohua He, Xulin Ma, Benfeng Wang, Guojiang Shen, Xiangjie Kong 0001. 69-83 [doi]
- Efficient Updateable Private Set Intersection on Outsourced DatasetsYan Zhang, Luyao Wang, Lu Zhou. 84-99 [doi]
- Client Evaluation and Revision in Federated Learning: Towards Defending Free-Riders and Promoting FairnessJiatong He, Libing Wu, Zhuangzhuang Zhang, Na Lu, Xuejiang Wei. 100-118 [doi]
- A Secure Dynamic Incentive Scheme for Federated LearningHanqing Yang 0008, Lixin Liu, Jingyu Wang, Zetian Zhang, Yun Hao. 119-136 [doi]
- A Data Synthesis Approach Based on Local Differential PrivacyZhihui Wang, Yishan Liu, Yuliang Ni. 137-151 [doi]
- Byzantine-Robust Aggregation for Federated Learning with Reinforcement LearningSizheng Yan, Junping Du, Zhe Xue, Ang Li. 152-166 [doi]
- Differential Privacy with Data Removal for Online Happiness AssessmentYanjie Luo, Lin Li, Xiaohua Wu, Xiaohui Tao. 167-182 [doi]
- EPCQ: Efficient Privacy-Preserving Contact Query Processing over Trajectory Data in CloudQu Lu, Hua Dai 0003, Bohan Li 0001, PengYue Li, Qian Zhou, Qiang Zhou, Geng Yang. 183-198 [doi]
- Parallel Secure Inference for Multiple Models Based on CKKSWeibin Wu 0003, Ying Wang, Yangpan Zhang, Luyao Wang, Lu Zhou 0002. 199-213 [doi]
- PrivRBFN: Building Privacy-Preserving Radial Basis Function Networks Based on Federated LearningRong Wang, Siyu Wang. 214-227 [doi]
- Robust Federated Learning with Realistic CorruptionPuning Zhao, Jiafei Wu, Zhe Liu. 228-242 [doi]
- BTQoS: A Tenant Relationship-Aware QoS Framework for Multi-tenant Distributed Storage SystemYixuan Lu, Yun Qu 0006, Dongjie Zhu, Rui Zhang, Haiwen Du. 245-260 [doi]
- ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on BlockchainYifan Wang, Yu Tao, Hao Wang 0189, Chunpeng Ge, Lu Zhou 0002. 261-277 [doi]
- MTEC: A Multi-tier Blockchain Storage Framework Using Erasure Coding for IoT ApplicationXinwei Xu, Yongkang Yu, Jinchun He, Qinnan Zhang, Hongwei Zheng 0007, BingHui Guo, Jin Dong, Wangjie Qiu. 278-293 [doi]
- Maintaining Data Freshness in Multi-channel Multi-hop Wireless NetworksQinglin Xie, Yingyan Li, Yuan Chai, Quan Chen, Fanlong Zhang, Yongchao Tao. 294-308 [doi]
- Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DAppsMeiqi Yang, Yu Tao, Xiaofei Wu, Chunpeng Ge, Lu Zhou 0002. 309-325 [doi]
- KTSketch: Finding k-Persistent t-Spread Flows in High-Speed NetworksShaolong Zhou, Hanwen Zhang, Guoju Gao, Yu-e Sun, He Huang 0001, Xiaoyu Wang, Yihuai Wang. 326-342 [doi]
- A Multi-Agent Service Migration Algorithm for Mobile Edge Computing with Diversified ServicesJining Chen, Linbo Liao, Yongxuan Lai, Liang Song, Fan Yang 0010. 343-358 [doi]
- Dynamic Computation Scheduling for Hybrid Energy Mobile Edge Computing NetworksRan Bi 0001, Weiye Si, Jiankang Ren, Xiaolin Fang 0001, Yiwei Sun, Bingguo Chen. 359-376 [doi]
- Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic FeaturesHui Liu, Ke-ji, Zhenxiang Chen, Kun Ma 0001, Xiaofan Zhao. 379-393 [doi]
- Detecting Camouflaged Social Bots Through Multi-level Aggregation and Information EncodingZiyi Wang, Kui Zhao. 394-410 [doi]
- Deep Sarcasm Detection with Sememe and Syntax KnowledgeZhiqiang Zhang 0010, Jiajun Shan, Haiyan Wu, Yanhong Chen, Jinxun Jiang, Weijie Wang. 411-431 [doi]
- Enhancing Few-Shot Multi-modal Fake News Detection Through Adaptive FusionQiang Ouyang, Nankai Lin, Yongmei Zhou, Aimin Yang, Dong Zhou 0001. 432-447 [doi]
- AGAE: Unsupervised Anomaly Detection for Encrypted Malicious TrafficHao Wang, Ye Wang, Zhaoquan Gu, Yan Jia. 448-464 [doi]
- ColBetect: A Contrastive Learning Framework Featuring Dual Negative Samples for Anomaly Behavior DetectionZiqi Yuan, Haoyi Zhou, Qingyun Sun, Jianxin Li 0002. 465-480 [doi]
- Magnitude-Contrastive Network for Unsupervised Graph Anomaly DetectionFei Ge, Ji Zhang, Zhen Wang, YuQian Zhou, Zhao Li. 481-493 [doi]
- Substructure-Guided Graph-Level Anomaly Detection with Attention-Aware AggregationShaojun Duan, Xinye Wang, Zhenyang Yu, Chengxin He, Zhaohang Luo, Song Deng, Lei Duan. 494-509 [doi]